diff --git a/_information/Collections.md b/_information/Collections.md index b140e83..eff3e06 100644 --- a/_information/Collections.md +++ b/_information/Collections.md @@ -5,7 +5,9 @@ title: Collections permalink: /collections --- -## Information Pages +
+

Various pages on miscellaneous information and topics.

+

@@ -15,6 +17,13 @@ A collection of links, articles, resources and more.
+--- + ## [Qubes OS](./qubes) -A collection of QubesOS related content. \ No newline at end of file +A collection of QubesOS related content. + +
+ + +[dvm-zulucrypt](./qubes/dvm-zulucrypt) - Notes on how to setup a disposable zulucrypt instance for USB devices. \ No newline at end of file diff --git a/_information/Qubes/dvm-zulucrypt.md b/_information/Qubes/dvm-zulucrypt.md new file mode 100644 index 0000000..3b83bba --- /dev/null +++ b/_information/Qubes/dvm-zulucrypt.md @@ -0,0 +1,34 @@ +--- +layout: default1 +description: Notes reguarding DVM zulucrypt +title: dvm-zulucrypt +permalink: /qubes/dvm-zulucrypt +--- + +Notes on how to setup a disposable zulucrypt instance for USB devices. + +
+ +### Prerequesites: + +Setup a minimal `kicksecure` template based on [this guide](./#debian-security). + +Install the `zulucrypt` package: + +``sudo apt install zulucrypt`` + +
+ +### Setup + +- Create an `AppVM` titled `template-dvm-crypt` with the template created above. + +- Net Qube: `(none)` + +- In `Advanced`, select `Disposable Template` + +- In `Applications` select `zuluCrypt` + +
+ +After this, create a new `DisposableVM` titled `dvm-crypt` with the template as `template-dvm-crypt` and networking as `(none)`. \ No newline at end of file